logic instructions , Basic Computer Science

Assignment Help:
They are used to act upon logic operations on the operators.
AND
OR, NEG
NOT
TEST
XOR

AND INSTRUCTION
Function: It acts upon the conjunction of the operators bit by bit.
Syntax:
AND destiny, source
The outcome of this operation is stored on the destiny operator.
OR INSTRUCTION
Function: Logic inclusive OR
Syntax:
OR destiny, source

NEG INSTRUCTION
Function: It produces the complement to 2.
Syntax:
NEG destiny
This instruction produces the complement to 2 of the destiny operator and stores it on the similar operator.
NOT INSTRUCTION
Function: It carries out the turnaround of the destiny operator bit by bit.
Syntax: NOT destiny
The outcome is stored on the same destiny operator.

TEST INSTRUCTION
Function: It logically evaluates the operators
Function: TEST destiny, source
It executes a conjunction, bit by bit, of the operators, but differing from AND, this instruction does not place the result on the destiny operator, it only has effect on the state of the flags.
XOR INSTRUCTION
Function: OR exclusive
Syntax:
XOR destiny, source its function is to do the logic exclusive disjunction of the two operators bit by bit.

Related Discussions:- logic instructions

What is a signaling protocol, QUESTION (a) How VoIP Works and how VoIP ...

QUESTION (a) How VoIP Works and how VoIP helps today's business? (b) What is a signaling protocol? Explain about SIP components and their key benefits (c) What is IPTV? L

What are the most common forms of mixing, Question 1 What is the differenc...

Question 1 What is the difference between Variable Bit Rate and Constant Bit Rate? Question 2 Write a note on: Normalization, Reverberation, Noise Reduction, Filters, and

Write separate programs for each of the above points, Question 1 Describe ...

Question 1 Describe the following with respect to creating Web Forms in .Net environment- Web Form Life Cycle Creating a Web Form Write programs with corresponding

Microprocessor, how does microprocessor interpret with the burglar alarmn

how does microprocessor interpret with the burglar alarmn

Explain the protection features of ms access, Question 1 Explain the pr...

Question 1 Explain the protection features of MS Access? 2 What is Query Parameter? 3 What are the steps to be taken for improving performance of Microsoft Access database? 4 W

Draw a neat diagram of the organization of computer, Question 1 Draw a nea...

Question 1 Draw a neat diagram of the organization of computer and explain about each unit Question 2 Explain batch processing system and multi-processing in brief Questi

E - R diagram, draw the e r diagram for irctc rail ticket reservation onlin...

draw the e r diagram for irctc rail ticket reservation online

Geometric mean - algorithm, The geometric mean is obtained by multiplying a...

The geometric mean is obtained by multiplying all the four numbers and taking the fourth root of the product. Let x 1 ,x 2 ,x 3  and x 4  be the given four numbers then geometric

Deadlocks, What is methods For handling Deadlocks?

What is methods For handling Deadlocks?

471, #que411stion..

#que411stion..

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd